Fig 1 - uploaded by Biju Issac
Content may be subject to copyright.
Dual IPv4 and IPv6 Stack Structure [7] 

Dual IPv4 and IPv6 Stack Structure [7] 

Source publication
Conference Paper
Full-text available
IPv6 protocol which would replace IPv4 in the near future is a major boost to network technology as it has many inherent good qualities that IPv4 lacks. We seek to analyze some features of the IPv6 network communication. To understand more on the co-existence technology between IPv4 and IPv6, tunneling and dual stack technology were configured in s...

Context in source publication

Context 1
... dual IP layer or dual stack approach is technology that includes both the IPv4 Internet layer and the IPv6 Internet layer as in figure 1. This mechanism is used by IPv6/IPv4 nodes so that interaction with both IPv4 and IPv6 nodes can occur. ...

Similar publications

Conference Paper
Full-text available
Az Európára jutó IPv4 címtartományok végleges kiosztása 2011-ben nem csak egyetemi környezetben, hanem az egyéb céges területeken is objektíven teszik szükségessé az IPv6 szolgáltatások bevezetését és elterjesztését Magyarországon. Az IPv6 technológia várhatóan több évtizedig ki fogja szolgálni a konvergens adat- és multimédia (hang, video) kommuni...
Article
Full-text available
In this research, we propose an architectural solution to implement file transfer service (FTP) in IPv6 environment network. IPv6 is considered to be the next-generation Internet protocol. Thus, this study is to analyze the size of files transfer performance and to measure Quality of Service (QoS) delivered by IPv6 using best effort approach in com...
Conference Paper
Full-text available
As a result of the vast Internet growth, a multi-homing technology is being extensively utilized to keep connectivity to important networks. However, the traditional multi-homing architecture severely impacts routing performance of the Internet making it non-scalable. Furthermore, although it can enhance reachability in case of connectivity anomali...
Conference Paper
Full-text available
The MPEG-2 standard supports a range of transmission methods for a range of services. This document provides a threat analysis and derives the security requirements when using the Transport Stream, TS, to support an Internet network-layer using unidirectional lightweight encapsulation (ULE). The document also provides the motivation for link-level...
Article
Full-text available
This paper focuses on a measurement-based comparison of the handover for different mobility protocols: Mobile IPv4, Mobile IPv6 and Fast Handovers for Mobile IPv6. The paper studies the handover using active and passive measurements computing the handover latency, packet losses and the provided QoS level in a real testbed. Our experimental results...

Citations

... Chen et al, [38] discussed the limitation of IPv4 by presenting features and qualities of IPv6 network communications such as; new header format, more IP address space, in-built security, solution to routing table growth with efficient and hierarchical routing, auto-configuration of IPv6 and better QOS (Quality of Service). They further explained co-existence technology between IPv4 and IPv6 and conducted an experiment using simulation to present 6to4 tunnel and Dual stack transition methods. ...
Conference Paper
Full-text available
Due to the continuous growth of the Internet, current internet communication protocol (IPv4) is no longer sufficient for the future. The Next generation Internet Protocol (IPv6) brings the solution for the long predicted limitations of IPv4. But the resistance to change from IPv4 is hindering the adoption of IPv6. In Africa, IPv4 is still in use and as a result affecting the acceptance of IPv6. These research work analysed the factors affecting IPv6 adoption in Nigeria by conducting a survey for enterprise organizations to understand their deployment approach and challenges faced. Many organizations indicated insufficient technical skills, lack of training programs, cost of upgrade etc. as key factors affecting IPv6 deployment. Further investigation was conducted by some world renowned organizations based on their IPv6 deployment strategies and five key phases were discovered to be used. A simulation experiment of dual-stack and 6to4 tunneling mechanism was conducted to understand how IPv4 and IPv6 co-exist simultaneously and how the gradual transition takes place.
... chaque personne sur terre à avoir 4.86 × 10 28 d'adresses IP[43]à sa disposition. Tous les objets quotidiens peuvent avoir accès à l'Internet individuel, non seulement être identifiés dans les catalogues de l'Internet, mais avoir aussi leurs propres adresses IP. ...
Thesis
Cette thèse traite de l’adaptation automatique des applications sensibles au contexte par l’utilisation d’informations liées à l’environnement social des utilisateurs afin d’enrichir le service rendu par les applications. Pour cela, notre contribution s’articule autour de la modélisation multidimensionnelle des différents niveaux de contextes sociaux, notamment le poids de la relation entre les acteurs. Plus spécifiquement, nous synthétisons des contextes sociaux non seulement liés à la familiarité mais aussi liés à la similitude des communautés statiques et dynamiques. Deux modèles basés respectivement sur les graphes et les ontologies sont proposés afin de satisfaire l’hétérogénéité des réseaux sociaux de la vie réelle. Nous utilisons les données réelles recueillies sur les réseautages sociaux en ligne pour conduire nos expérimentations et analysons les résultats en vérifiant l’efficacité de ces modèles. En parallèle nous traitons le point de vue de l’application, et nous présentons deux algorithmes utilisant des contextes sociaux pour améliorer la stratégie de transmission des données dans le réseau opportuniste, et particulièrement la contre-mesure aux nœuds égoïstes. Les simulations des scénarios réels confirment les avantages liés à l’introduction des contextes sociaux, en termes de taux de succès et de délais de transmission. Nous effectuons une comparaison avec d'autres algorithmes de transmission traditionnellement décrits dans la littérature pour compléter notre démonstration
... This transformation would allow each individual on earth to have 3.4 x 10 38 IP addresses (e.g. Chen et al., 2006) at his or her disposal; all one's "things" can have individual Internet access. This would enable everyday objects to, not only, be identified in Internet catalogues, but they would also have their own IP addresses. ...
Article
Full-text available
Purpose – The aim is to investigate concepts that are used in depicting future visions of society, as afforded by technology, to (a) map the extent of their use, (b) examine the level of their dominance in different research areas and geographic boundaries, (c) identify potential overlaps, (d) analyse their longitudinal growth, and (e) examine whether any of the identified concepts has assumed an overarching position. Design/methodology/approach – Fourteen concepts, each of which is used to depict visions of future information infrastructures, were identified. More than 20,000 scholarly documents related to eleven of these concepts (those with 20 or more documents) are analysed by various qualitative/quantitative methods. Findings – The two concepts most referred to are semantic web and ubiquitous computing (all years), and internet of things” (year 2013). Publications on some newer concepts (e.g. “digital living”, “real world internet”) are minimal. There are variations in the extent of use and preferred concepts based on geographic and disciplinary boundaries. The overlap in the use of these terms is minimal and none of these terms has assumed an overarching umbrella position. Research limitations/implications – This study is limited to scholarly publications; it would be relevant to also study the pattern of usage in governmental communications and policy documents. Social implications – By mapping multiplicity of concepts and the dispersion of discussions, we highlight the need for, and facilitate, a broader discussion of related social and societal implications. Originality/value – This article is the first to present a collective of these related concepts and map the pattern of their occurrence and growth. For full paper see: http://www.emeraldinsight.com/doi/pdfplus/10.1108/JD-03-2013-0033
... Küçük paket boyutu kullanarak tek işletim sistemi üzerinde IPv4 ve IPv6 performans açısından karşılaştırılmıştır [3]. Tek işletim sistemi kullanarak Sanal ortamda IPv4,IPv6 Performansı verim ve gecikme zamanı açısından karşılaştırılmıştır makale Cisco tarafından yayınlamıştır [4,5]. Farklı Windows sürümlerini kullanarak IPv4 ve IPv6 performans karşılaştırması yapılmıştır ve sonuçlarda IPv4 performansını IPv6 daha verimli çalıştığı gösterilmiştir [6,7] bu sonuçlarda bu makalenin hipotezi ile uyumludur çünkü IPv6 ile çalışan ağların yükü daha fazla IPv4 ağlarına göre bu da ağ performansının düşmesine neden olacağını tahmin edilmektedir. ...
Article
Full-text available
ZET Son dönemde IPv4 adres havuzu yok olmaktadır dolayısıyla ağların biran önce IPv6 " ya geçmesi gerekmektedir. Böylece ağlar büyük adres havuzuna sahip olup bütün bu sıkıntılar ortadan kalkacaktır. IPv6 adresleri bir önceki sürüm protokolünde oluşmakta olan sorunları gidererek daha fazla olanaklar sağlamaktadır. Bu iletişim protokolünü barındıran işletim sistemlerinin etkileşiminde artan yükler nedeniyle ağ performansında sorunlara neden olmaktadır. Bu makalede Windows ve Linux işletim sistemlerini kullanarak IPv4 ve IPv6 ağlarının performans karşılaştırması yapılmıştır. Karşılaştırmada farklı veri boyutlarını (KByte, MByte ve GBit) IPv4 ve IPv6 ağları üzerinden göndererek TCP ve UDP protokollerinin performansları ölçülmüştür. performans değerlendirmesinde verim, gecikme zamanı ve jitter metrikleri hesaplanmıştır. Denemede paket gönderme programı Jperf, paket üreticisi olarak kullanılmıştır. ABSTRACT Current internet protocol IPv4 is about going to finish. Networks must transition to new internet protocol IPv6, that have larger address pool however it has limitations that hinder its growth. IPv6 addresses will solve alote of interent problems in the earlier version protocol and it provides new opportunities. However, due to the increased overhead in IPv6 and it " s interaction with the operating system that hosts this communication protocol, there may be network performance issues. This paper will focus on the considerations that affect network performance analysis for IPv4 and IPv6 based networks for ubuntu12.0.4 and Windows 7 Operating Systems deployed on top of a virtual infrastructure. Virable data size (KByte, MByte and GBit) were used to compare two internet protocols. Two virtual computers are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, and jitter are measured on virtual test-bed implementation.
... ISPs are considering a shift from IPv4-IPv6. IPv4 protocol has the capability to migrate to IPv6 within a short period [2,9]. It costs too heavy and does not allow the interruption of the service, and damage to critical distributed applications. ...
Article
The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge
... Teredo mechanism has been evaluated using simulation is [13]. Multiple transition mechanisms have been tested for performance in [14] [15] and shown that performance degradation does occur as data traverses transition border. ...
Conference Paper
Full-text available
Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured tunnel and 6to4 transition mechanism, have been empirically evaluated for performance. Both mechanisms are implemented on two different Linux distributions, and performance related metrics like throughput, delay, jitter and CPU usage of the transition end nodes are measured. The results obtained on the test-bed show that TCP/UDP throughput and jitter values of the two mechanisms are similar, but delay reading is significantly different depending on the choice of transition mechanism and operating system.
... Teredo mechanism, which was introduced to enable the hosts located behind one or multiple IPv4 NATs to obtain IPv6 nodes connectivity by tunneling packets over UDP, has been evaluated using simulation is [14]. Multiple transition mechanisms have been tested for performance in [15] [16] and shown that although overheads are minimal, performance degradation does occur as data traverses transition border. ...
Conference Paper
Full-text available
Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the globe, and has become the default communication mechanism for businesses and individuals. IPv4 addresses will soon be exhausted, which has initiated development of IPv6. The new IP version provides solution to problems that were inherent in the earlier version, and also offers additional opportunities. However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured tunnel and 6to4 transition mechanism, have been empirically evaluated for performance. Both mechanisms are implemented on two different Linux distributions, and performance related metrics like throughput, delay, jitter and CPU usage of the transition end nodes are measured. The results obtained on the test-bed show that TCP/UDP throughput and jitter values of the two mechanisms are similar, but delay reading is significantly different depending on the choice of transition mechanism and operating system.
... Using simulation, DSTM performance using applications like Real Audio, CBR over UDP and FTP over TCP it has been shown that end-to-end delays are significant [12]. DSTM and 6t04 performance metrics is compared [13]. Similar research is undertaken in [14] and [15]. ...
Conference Paper
Full-text available
The potential exhaustion of IPv4 addresses initiated the development of IPv6. The new version of the Internet Protocol offers substantially more network and host addresses, however transition from current to the new version has been remarkably slow. There are multiple reasons for the sluggish transition: complexity and enormousity being the forerunners. Thus for the interim, various transition mechanisms have been developed. Each mechanism has its associated benefits and weaknesses. In this paper two such mechanisms, namely configured tunnel and 6to4 transition mechanism, have been empirically evaluated for performance. Both mechanisms are implemented on two different Windows Server operating systems and performance related metrics like throughput, delay, jitter and CPU usage of the transition end nodes are measured. The results obtained on the test-bed show that TCP/UDP throughput and jitter values of the two mechanisms are similar, but delay and CPU reading are significantly different depending on the choice of transition mechanism and operating system.
Conference Paper
Depleting IPv4 addresses has generated enormous interest in the new version of Internet Protocol, IPv6. It was developed by Internet Engineering Task Force (IETF) to completely replace IPv4. However, due to many reasons, migration to the new version of the Internet has been slow. For the interim, various transition mechanisms have been developed. This research examines and empirically evaluates the performance of two such transition mechanisms, namely 6to4 and configured tunnel when implemented on network infrastructure. Performance metrics like throughput, jitter and delay are measured for these transition mechanisms. This research shows that 6to4 transition mechanism gives better network performance than configured tunnel.
Conference Paper
Simulation modeling of computer networks is an effective technique for evaluating the performance of network and data transfer with various internet protocols. In this paper we are focusing on the impact of used transport layer protocol transferred with new internet protocol (IPv6) against network performance, especially network router load and efficiency. Higher values of load or worse efficiency can be a problem in global IPv6 deployment. We propose methodology of traffic measurement based on different stochastic systems. We are able to generate different TCP, UDP and SCTP traffic according to uniform probability distribution for packet inter departure time and packet size. We use a generator that is able to reproduce experiment by using the same seed for random values and we focus on the correlation of packet size, inter departure time to router and communicating nodes load. All experiments were made in pure IPv4 environment and in native IPv6 environment too. We expected that the use of a new protocol lead to higher efficiency of data transfer. By using forward stepwise regression analysis we identify which variables imply the packet transfer time.